Open in app
Home
Notifications
Lists
Stories

Write
Christovito Hidajat
Christovito Hidajat

Home

Nov 21, 2021

Nivdort Dynamic Malware Analysis Using ANY.RUN

According to Wikipedia, Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware can exist in many forms, such as computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, wiper and scareware. This phenomenon can be a real scare…

Nivdort

6 min read

Nivdort Dynamic Malware Analysis Using ANY.RUN
Nivdort Dynamic Malware Analysis Using ANY.RUN

Oct 31, 2021

Performing Simple Linux Forensics and Monitoring

Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds (Wikipedia). As one of the most used operating systems in the world, Linux can also be seen as an “easy target” for the…

Linux

7 min read

Performing Simple Linux Forensics and Monitoring
Performing Simple Linux Forensics and Monitoring

Oct 22, 2021

A Closer Look At Windows Forensics

As stated in Wikipedia, Windows is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. It was first release in 1985, and since then became one of the most well-known operating system mainly on desktop/laptop device. …

Windows

10 min read

A Closer Look At Windows Forensics
A Closer Look At Windows Forensics

Oct 3, 2021

Digital Image Forensics: Ways to Investigate Images’ Reliability

Performing Digital Image Forensics Using ExifTool, JPEGsnoop, and Forensically Living in a world that is getting more and more technologically advanced makes it ridiculously easy to utilise many tools to manipulate things such as digital images. Cutting, cloning, or resizing an image is indirectly a very simple example of digital…

Image

6 min read

Digital Image Forensics: Ways to Investigate Images’ Reliability
Digital Image Forensics: Ways to Investigate Images’ Reliability

Sep 26, 2021

Insecure CAPTCHA: DVWA Hacking for Unsafe Verification Process

Damn Vulnerable Web Application (DVWA): Testing CAPTCHA Vulnerabilities When entering a website, we have probably experienced filling combinations of letters and numbers or selecting which images contain traffic lights or chimneys a thousand times. …

Captcha

11 min read

Insecure CAPTCHA: DVWA Hacking for Unsafe Verification Process
Insecure CAPTCHA: DVWA Hacking for Unsafe Verification Process

Sep 19, 2021

Should We be Allowed to be Invisible on the Net?

Online Anonymity: A Controversial Technique for Anti-computer Forensics As Internet users, it is certain that we want all our data input to the net systems safe and secure. By “data”, we most likely mean private details such as phone numbers, house address, and perhaps ID card numbers when you buy…

Digital Forensics

6 min read

Should We be Allowed to be Invisible on the Net?
Should We be Allowed to be Invisible on the Net?

Apr 25, 2020

ESP32 Chapter 12: After Hours of Inserting Data into MySQL Database using PHP

Note: this will be the very last post of the ESP32 Series Hello and Welcome! Alrighty, this very last project of ESP32 personally was the most complex and relatively time-consuming, but the very best one I have to say. The word “best” more likely describes the struggle my team and…

Esp 32

8 min read

ESP32 Chapter 12 : After Hours of Inserting Data into MySQL Database using PHP
ESP32 Chapter 12 : After Hours of Inserting Data into MySQL Database using PHP

Apr 25, 2020

ESP32 Chapter 11: Data Input on HTML Form ESP32 Web Server

Hello and Welcome! In the past few months, we have been the witnesses of how beneficial an ESP32 board is, and trust me, there are still lots of other things this little thing can do. To be honest, after all these projects, I come up with a thought that it…

Esp 32

7 min read

ESP32 Chapter 11 : Data Input on HTML Form ESP32 Web Server
ESP32 Chapter 11 : Data Input on HTML Form ESP32 Web Server

Apr 25, 2020

ESP32 Chapter 10: Being A Weather Forecaster with DHT11

DHT11 Readings Transmission to Google Sheets Hello and Welcome! First thing first, I do hope you’re doing great and being productive in these times. If you are still reading and putting faith on my blogs, well, thank you. I wish I could keep you updated with all the upcoming projects. …

Esp 32

6 min read

ESP32 Chapter 10 : Being A Weather Forecaster with DHT11
ESP32 Chapter 10 : Being A Weather Forecaster with DHT11

Apr 25, 2020

ESP32 Chapter 9: DHT11 Readings into Plot Charts

Data Visualisation of DHT11 Readings in HTML Web Server Hello and Welcome! If you are reading this while laying on your bed, figuring out how to kill some time, and wondering how long it takes for the pandemic-lockdown stuff to end, congratulations, you are not alone! It’s nearly been a…

Esp 32

7 min read

ESP32 Chapter 9 : DHT11 Readings into Plot Charts
ESP32 Chapter 9 : DHT11 Readings into Plot Charts
Christovito Hidajat

Christovito Hidajat

Following
  • ASSISTS ITB

    ASSISTS ITB

  • Patrick Segara

    Patrick Segara

  • Jingga Mutiara Windyarahma

    Jingga Mutiara Windyarahma

  • Yonatan Jori Saputro

    Yonatan Jori Saputro

  • Tafia Alifianty

    Tafia Alifianty

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable